2014 Training Programs - ISACA

3-. COBIT 5 Foundation & Exam. 11-13 May. 5 Star Hotel. 600*. 4-. WebApp, Mobile, Email Security .... Its a business Call b. ..... To understand day-to-day security concerns and make security a 'way of life' ... Android Exploitation Framework.
342KB Sizes 9 Downloads 258 Views
2014 Training Programs Courses & Workshops Course Title

Dates

Venue

Fees(BHD)

1-

IT Security Workshop

16-18 March

5 Star Hotel

600

2-

IT GRC Workshop

13-14 April

5 Star Hotel

400

3-

COBIT 5 Foundation & Exam

11-13 May

5 Star Hotel

600*

4-

WebApp, Mobile, Email Security

18-19 May

5 Star Hotel

400

5-

Auditing IT Operations Workshop

12-14 October

5 Star Hotel

600

Note: ISACA Members receive 25% discount on listed fees for above courses

Certification Courses Course Title

Dates

Venue

Fees(BHD)

1-

CISA Preparation Course

4 May-3 June

TBA

800**

2-

CISM Preparation Course

4 May- 3 June

TBA

800**

3-

CISA Weekend Crash Course

23-24 May

TBA

120***

4-

CISM Weekend Crash Course

30-31 May

TBA

120***

5-

CGEIT Weekend Crash Course

23-24 May

TBA

120***

6-

CRISC Weekend Crash Course

30-31 May

TBA

120***

*

Option to set for Foundation Certification Exam at a fee

**

Inclusive of Lectures, Membership and Exam Fees, 2014 Review Manual and Q&A Database CD

***

Lectures only and will be held if minimum of 5 candidates registered.

P.O.Box 50933 Kingdom of Bahrain Fax: +973 17 911 477 Phone: +973 3534 2513 PG. 1 1

Page 1

Information Security Workshop 16-18 March 2014, Crowne Plaza Hotel

Key Learning Objectives: 1. Understand Information Security needs and learn about Risk Management Essentials 2. Understand Standards and Best Practices in Information Security Management 3. Policies, Standards, Procedures, Guidelines 4. Understand Business Continuity as essential element of Information Security 5. Understanding Controls to manage Security 6. Measuring Security Management Effectiveness

Target audience:  IT Security Professionals  IT Auditors  IT Professionals

Fees: BD600

P.O.Box 50933 Kingdom of Bahrain Fax: +973 17 911 477 Phone: +973 3534 2513 PG. 2 2

Page 2

8:30 -

9:00

Registration

9:00 - 10:30

Session I

10:30 - 11:00

Coffee Break

11:00 - 12:30

Session II

12:30 - 13:30

Lunch Break

13:30 - 15:00

Session III

Day one: 1.Definitions: a. Security b. Information, Data Asset c. Standards, Best Practices 2.Accountability, Responsibility for Security & Risks 3.Information Security Governance 4.Process Approach – SIPOC, ETVX, PDCA8.Compliance Vs Conformity 5.Laws - basic needs – Information Act, Privacy, Intellectual Property 6.Risk Management – Part 1 a. Risk Culture of an Organization b. Asset recognition c. Risk Recognition d. Risk Evaluation – Qualitative and Quantitative e. Risk Response Process – Defining Residual risks f.

Risk Prioritization

g. Essentials of Risk Monitoring 7. Risk Management - Part II a. Risk management Considerations b. Risk Treatment Plans c. Risk response Process d. Risk KRIs e. Information Systems Control Design and Implementation P.O.Box 50933 Kingdom of Bahrain Fax: +973 17 911 477 Phone: +973 3534 2513 PG. 3 3

Page 3

Day two: 1. Risk Management in Information Systems Control – Part 111 a. Determine IT Strategy